Rep. Curt Weldon later claims that while he never learns about Able Danger prior to 9/11, he does become aware of the Land Information Warfare Activity’s (LIWA) similar data mining efforts in 1999 and is very impressed. He says that on this day, he is part of a meeting with the deputy directors of the FBI and the CIA and others. Using LIWA as a model, Weldon proposes a national collaborative center that would use open source data as well as classified information from 33 government agencies “to basically assess emerging transnational terrorists threats. The CIA, two years before 9/11, said, we don’t need that. We’ve put language in three successive defense bills, in spite of that, calling for a national collaborative capability. Prior to 9/11, we didn’t have that capability, and we were hit.” [US Congress, 2/15/2006]

A 1999 study by the US Army’s Land Information Warfare Activity (LIWA) to look into possible Chinese front companies in the US seeking technology for the Chinese military created controversy and was ordered destroyed in November 1999 (see Mid-1999-November 1999). However, apparently Rep. Curt Weldon (R-PA) protests, and the issue finally comes to a head during this month. One result of this controversy will be what Major Erik Kleinsmith will later call “severely restricted” support for Able Danger, including a temporary end to LIWA support (see April 2000) In an April 14, 2000 memorandum from the legal counsel in the Office of the Joint Chiefs of Staff, Captain Michael Lohr writes that the concern over the LIWA data mining study raises privacy concerns: “Preliminary review of subject methodology raised the possibility that LIWA ‘data mining’ would potentially access both foreign intelligence (FI) information and domestic information relating to US citizens (i.e. law enforcement, tax, customs, immigration, etc.… I recognize that an argument can be made that LIWA is not ‘collecting’ in the strict sense (i.e. they are accessing public areas of the Internet and non-FI federal government databases of already lawfully collected information). This effort would, however, have the potential to pull together into a single database a wealth of privacy-protected US citizen information in a more sweeping and exhaustive manner than was previously contemplated.” Additionally, the content of the study is another reason why it caused what Weldon calls a “wave of controversy.” The study had connected future National Security Adviser and Secretary of State Condoleezza Rice, former Defense Secretary William Perry, and other prominent US citizens to business transactions with Chinese military officials.(see Mid-1999-November 1999). [New York Post, 8/27/2005; Office of Congressman Curt Weldon, 9/17/2005; US Congress, 9/21/2005; Washington Times, 9/22/2005; Washington Times, 10/9/2005] One article on the subject will comment, “Sources familiar with Able Danger say the project was shut down because it could have led to the exposure of a separate secret data mining project focusing on US citizens allegedly transferring super-sensitive US technology illegally to the Chinese government.” [WTOP Radio 103.5 (Washington), 9/1/2005] A massive destruction of data from Able Danger and LIWA’s data mining efforts will follow, one month later (see May-June 2000).

The Able Danger data collection program—which lost the support of the US Army’s Land Information Warfare Activity (LIWA) unit last April (see April 2000)—is reconstituted and moved to a private intelligence research center run by Raytheon in Garland, Texas. While the program worked only with unclassified data under LIWA, the new Able Danger, referred to by some as “Able Danger II,” has permission to mine classified information as well. [US Congress, 9/21/2005; US Congress, 9/21/2005] SOCOM apparently believes that this new arrangement will allow Able Danger to do its work free of some of the political interference that had hobbled the earlier effort. Other data mining teams at LIWA work on non-al-Qaeda related projects while Able Danger continue to focus on al-Qaeda. [National Journal, 12/3/2005] Most accounts have the first version of Able Danger in early 2000 being the version that identified Mohamed Atta and three other 9/11 hijackers. However, according to Representative Curt Weldon (R-PA), a Raytheon employee named Bob Johnson will later claim that Atta is independently identified by this second version of Able Danger as well (see November 11, 2005).

Rep. Curt Weldon.
[Source: House of Representatives]Rep. Curt Weldon (R-PA) is not yet familiar with Able Danger, though he will help bring information about the program to light in 2005. However, he is familiar with the closely related Land Information Warfare Activity (LIWA) program, having had dealings with it before 9/11. He says he is frustrated at the apparent lack of understanding about programs like LIWA based on the lines of questioning at public 9/11 Commission hearings in early 2004, so, “On at least four occasions, I personally tried to brief the 9/11 Commissioners on: NOAH [Weldon’s pre-9/11 suggestion to have a National Operations and Analysis Hub]; integrative data collaboration capabilities; my frustration with intelligence stovepipes; and al-Qaeda analysis. However, I was never able to achieve more than a five-minute telephone conversation with Commissioner Thomas Kean. On March 24, 2004, I also had my Chief of Staff personally hand deliver a document about LIWA, along [with] questions for George Tenet to the Commission, but neither was ever used.” [US Congress. Senate. Committee on Judiciary, 9/21/2005] He says: “The next week, they sent a staffer over to pick up some additional materials about the NIWA, about the concept, and about information I had briefed them on. They never followed up and invited me to come in and meet with them. So they can’t say that I didn’t try.” [Office of Congressman Curt Weldon, 9/17/2005]

Ordering

Time period

Email Updates

Receive weekly email updates summarizing what contributors have added to the History Commons database

Donate

Developing and maintaining this site is very labor intensive. If you find it useful, please give us a hand and donate what you can.Donate Now

Volunteer

If you would like to help us with this effort, please contact us. We need help with programming (Java, JDO, mysql, and xml), design, networking, and publicity. If you want to contribute information to this site, click the register link at the top of the page, and start contributing.Contact Us